How Nextdoor is helping law enforcement connect with residents and reduce crime
Commentary: Annie Barco of Nextdoor shares examples of how her company's social network is helping law enforcement form tighter bonds that make communities safer.
State and local governments face a disturbing cybersecurity threat
Commentary: Particularly in smart cities, the threat of cyberattacks is as high as ever, says the CEO of Minerva Labs.
'Without reasonable delay' — How security breach reporting is evolving in government
Commentary: The IT security landscape is changing, and Jayne Holland, NIC's chief security officer, says agencies must respond in kind.
Protecting first responder networks is both expensive and essential
Commentary: Some of the nation’s most critical communications infrastructure deserves the same level of cybersecurity attention that the military and intelligence agencies give their networks, says John Minasyan, director of product management at Belkin.
Four ways state and local CIOs can boost cybersecurity
Commentary: Tanium Security Director Andre McGregor draws on his experience with the FBI to lend state and local government tech teams advice for keeping their networks and data secure.
Emerging technologies empower government to respond to constituent demand
Commentary: Leaders from consultancy NIC Inc. say technologies like chatbots, "voice-first" devices, and virtual reality are enabling government to serve its public like never before.
Securing the government cloud: Tips for screening SaaS products
Commentary: Some vendors mislead their customers when it comes to cybersecurity. Everlaw CEO AJ Shankar shares a few questions that should be asked to keep them honest.
Why autonomous vehicles might accelerate the theft of personal information
Commentary: As autonomous vehicles start to change the way states and cities think about transportation, agencies must think about the cybersecurity implications of the technology.
How states can improve cybersecurity on a budget
Commentary: Isaac Kohen, CEO of Teramind, says some of the biggest threats come from inside the organization and provide an accessible opportunity to tighten the perimeter.